| سطر 1: |
سطر 1: |
| | أمن المعلومات : | | أمن المعلومات : |
| | + | تعريف بأمن المعلومات ؟ |
| | + | |
| | + | فهم التهديدات |
| | + | البرمجيات الخبيثة "فيروسات - تروجان - سبام - ..." |
| | + | |
| | + | Security policies - سياسة الحماية |
| | + | Confidentiality policies |
| | + | |
| | + | Legal and Ethical Issues |
| | + | Cybercrime and computer crime |
| | + | Intellectual property, copyright, patent, trade secret |
| | + | Hacking and intrusion |
| | + | Privacy, identity theft. |
| | + | |
| | + | : Cryptography |
| | + | Block and stream ciphers |
| | + | Cryptographic hash functions, Message Authentication Codes (MAC) |
| | + | Public and private key systems |
| | + | Authentication |
| | + | Password system |